Goodreads helps you keep track of books you want to read.

Start by marking “Knjiga šifer” as Want to Read:

# Knjiga šifer

by

Ko smo že mislili, da smo z Da Vincijevo šifro dobili vpogled v najbolje zakamuflirano kodo svetovne zgodovine, je istega leta, torej leta 2003, na anglosaksonske police priletela briljantna Knjiga šifer, v kateri je avtor obdelal zgodovino maskiranja, kamufliranja in zastiranja informacij, ki bi utegnile koristiti političnim, vojaškim ali zgolj partnerskim nasprotnikom.
...more

Paperback, 470 pages

Published
2008
by Učila
(first published November 3rd 1999)

## Friend Reviews

To see what your friends thought of this book,
please sign up.

## Reader Q&A

This book is not yet featured on Listopia.
Add this book to your favorite list »

## Community Reviews

Showing 1-30

Start your review of Knjiga šifer

Oct 12, 2016
Paul E. Morph
rated it
it was amazing
·
review of another edition

Shelves:
books-read-in-2016

9788 432411439 1440 57418348 0 50828309836 7889474 45 24348 033 243417400836 5742 0328439 46459 94 974 243473 3047 83 50296 89 6448 434 8945 5079747 9703 5748439 3046 033 68148 08 0 1440 09 2709 974 509074 204 7413 83 9788 584137

974 009747 278948 01409 2709 24013 7014 1443 60894 0 374 8019429 2897 8027 4397088082 033 83 8027 03 43606836 204 9709 434 20399 7415 109 14 37023 837 145474 7403836 9788 14406 8 4314 703 0 1474 70382439074 034214364 45 274594670574 033 02 1474 2027 974 1042037 88367 ...more

974 009747 278948 01409 2709 24013 7014 1443 60894 0 374 8019429 2897 8027 4397088082 033 83 8027 03 43606836 204 9709 434 20399 7415 109 14 37023 837 145474 7403836 9788 14406 8 4314 703 0 1474 70382439074 034214364 45 274594670574 033 02 1474 2027 974 1042037 88367 ...more

Jun 06, 2008
Jim
rated it
it was amazing
·
review of another edition

Recommends it for:
Geeks and people who like geeks.

Shelves:
pop-sci-geek

The Code Book is like geek porn. Explanations of the theories behind cryptography are woven together with anecdotes of times when code-making or code-breaking was integral to historical events. Singh strikes an excellent balance with this book. The clarity of his writing makes the explanations of the mathematics of cryptography very straightforward without dumbing them down, and the historical connections are always fascinating.

Personally, my favorite part was the section devoted to the role ...more

Personally, my favorite part was the section devoted to the role ...more

Or rather, I should say, were still living in the same world already transformed by pretty good encryption. The methods for breaking the security still falls in the same category as usual: interception. Of course, the means of interception has gotten amazingly good and creative as hell, but that isnt the primary scope of this book.

Rather, its about an awesome crash course ...more

I had high expectations and it met them nicely. The book tells the story of ciphers and encryption through history from what the Greek and the Romans did, through the Enigma, and finally to RSA. The style is very easy and pleasant to read, everything is pretty understandable even if you don't ...more

Singh introduces us to famous historical ciphers and ...more

Maybe this is what growing up is about!

That being said, this is a very informative book about the past, present and future of cryptography. Singh takes us on a journey from ancient times where ...more

If you at all feel uncomfortable in your knowledge of one time pad cyphers, public/private keys, or the importance of really good cryptography for average folks, please read this book! It's sadly a bit out of date, but Singh does such a brilliant job of methodically building up the complexity in cyphers though history, that you will inevitably learn a ton.

I really enjoyed The Code Book. The explanations were well-done, and the history lessons amazed me, which is odd because I'm not a history fan. I learned a lot about codes and ciphers and how they work, and that was the best part of it all. I liked the writing, so I think I might pick up another Simon Singh book in the future.

Dec 02, 2008
Eric_W
rated it
it was amazing
·
review of another edition

Shelves:
current-affairs,
spies

Singh, author of Fermat's Enigma, has even included a code to practice one's deciphering skills on. The successful cryptanalyst will win $15,000. In the appendix, he discusses other famous attempts at breaking codes, including the recent book, The Bible Code, by Michael Drosnin. This work caused quite a stir a couple of years ago when Drosnin, building really on the work of several Hebrew scholars, claimed to have discovered several prophecies hidden in the text of the Bible, a forecast of the
...more

Aug 21, 2013
Krycek
rated it
it was amazing
·
review of another edition

Shelves:
non-fiction-history,
non-fiction-science

I was fascinated with codes and ciphers when I was a kid. I even had a "junior spy code kit" with a bunch of cool stuff and I could send little notes to friends with secret messages like "Mr. Nutzenjammer is a dork" and "Cindy eats her boogers" and we would all congratulate ourselves with our cleverness. That's all pretty juvenile, but the ciphers included in my little spy kit were the basics in modern encryption systems and you can read all about it in Simon Singh's

*The Code Book*, an excellent ...more
Sep 20, 2016
Abhishek Desikan
rated it
it was amazing
·
review of another edition

Shelves:
favorites

If you're looking for an excellent primer to the world of cryptography and cryptanalysis, then The Code Book, is the one you must lay your hands on.

The book can be looked at in three perspectives. At a micro level, it is a guide to the various techniques of secret writing, and how they can be deciphered. Right from Caesar's cipher to quantum cryptography, the book traces how encryption and decryption has evolved in the last two millennia, which, by itself is fascinating.

Second, it can be ...more

The book can be looked at in three perspectives. At a micro level, it is a guide to the various techniques of secret writing, and how they can be deciphered. Right from Caesar's cipher to quantum cryptography, the book traces how encryption and decryption has evolved in the last two millennia, which, by itself is fascinating.

Second, it can be ...more

Singh delves into the story of Mary Queen of Scots and explains in an epic and intersting way about how Mary's life depended upon whether her encrypted messages were deciphered. It goes on to the key role of mathematicians in WWII ...more

Enjoyably crafted and with the lay reader in mind, I think many could enjoy this ...more

Singh may be the best science writer out there. He has that rare ability to take complex science and math topics and explain in very straightforward laymans terms.

...more

This book details the world history ...more

[ ] One-way functions are sometimes called Humpty Dumpty functions. Modular arithmetic, sometimes called clock arithmetic in schools, is an area of mathematics that is rich in one-way functions. In modular arithmetic, mathematicians consider a finite group of numbers arranged in a loop [ ].

The two greatest hazards of the internet are pornography and security. I have no idea how this ...more

My favorite part in the book was the explanation of Quantum ...more

Jun 19, 2008
Nancy
rated it
it was amazing
·
review of another edition

Shelves:
still-owned,
mathematics

A fantastic exploration of cryptography, looking at the game of leapfrog between the code makers and the code breakers. I was fascinated by the story of the Enigma code as well as the incredible cracking of it. Singh also covers computer encryption in a manner which is easy to understand and fascinating in its detail.

The best part about this book is its accessibility. You don't need to be a mathematician to follow how codes were developed and broken. I was riveted by the development of ...more

The best part about this book is its accessibility. You don't need to be a mathematician to follow how codes were developed and broken. I was riveted by the development of ...more

Singh takes care to also give more technical explanations for what's going on, and you can use the charts to try out some of them for yourself.

Just recently, there's the story of the "runic code" that was finally solved - and it turns out it was used mostly for fun (with one of the translated messages saying, simply, "Kiss me"). ...more

topics | posts | views | last activity | |
---|---|---|---|---|

Interesting book | 3 | 40 | Jan 25, 2015 06:08AM | |

an eye-opener... | 3 | 65 | Sep 06, 2011 08:25PM |

## Goodreads is hiring!

Simon Lehna Singh, MBE is a British author who has specialised in writing about mathematical and scientific topics in an accessible manner. He is the maiden winner of the Lilavati Award.

His written works include

His written works include

*Fermat's Last Theorem*(in the United States titled*Fermat's Enigma: The Epic Quest to Solve the World's Greatest Mathematical Problem*),*The Code Book*(about cryptography and its history), ...more## News & Interviews

Has it been a while since you've explored the mystery and thriller genre? Well, you're in luck because you are about to discover a lot of great...

68 likes · 37 comments

No trivia or quizzes yet. Add some now »

“if N is large enough, it is virtually impossible to deduce p and q from N, and this is perhaps the most beautiful and elegant aspect of the RSA asymmetric cipher.”
—
2 likes

“Ron Rivest, one of the inventors of RSA, thinks that restricting cryptography would be foolhardy: It is poor policy to clamp down indiscriminately on a technology just because some criminals might be able to use it to their advantage. For example, any U.S. citizen can freely buy a pair of gloves, even though a burglar might use them to ransack a house without leaving fingerprints. Cryptography is a data-protection technology, just as gloves are a hand-protection technology. Cryptography protects data from hackers, corporate spies, and con artists, whereas gloves protect hands from cuts, scrapes, heat, cold, and infection. The former can frustrate FBI wiretapping, and the latter can thwart FBI fingerprint analysis. Cryptography and gloves are both dirt-cheap and widely available. In fact, you can download good cryptographic software from the Internet for less than the price of a good pair of gloves.”
—
1 likes

More quotes…